Technical information

W24 Embedded Web Server
2-80 AT+i Commands Reference Manual May 31, 2008
<BODY>
<FORM METHOD='GET' ACTION=''>
Dial To:<INPUT type='text' name='ISP1' value='~ISP1~'>
<input type='submit' size='8' value='Submit'>
</FORM>
</BODY>
</HTML>
Note that the variable name is used in the NAME field, while ~<parameter name>~ is used to
display the current value.
After activating SUBMIT, the browser issues a GET command to W24's web server that includes
the parameter's name and the new value entered in the form. The page is then served to the
browser again with the updated values.
In addition to specifying W24 configuration parameters and Parameter Tags, it is also possible to
display W24 reports and W24's MAC address. For example:
<table>
<tr>
<td width=250><b>MAC Address: ~MACA~ <b></td>
</tr>
<tr>
<td width=250><b>Bootblock Version: BBIC~RP3~</b> </td>
<td width=400><b>Firmware Version: ~RP1~</b></td>
</tr>
<tr>
<td width=250><b>Serial Number: ~RP5~ </b></td>
<td width=400><b>Hardware Version: ~RP0~</b></td>
</tr>
</table>
Security and Restrictions
The authorization to view and update W24's configuration parameters, firmware, or application
website via the web can be password-protected using the AT+iRPG parameter (Remote
Parameter Group/Password).
When the RPG parameter in a W24 device contains a value, it is considered a password that
restricts remote W24 parameter viewing/updates. By default, W24's configuration site can be
viewed (browsed), unless the Security Disable Mode (SDM) bit 3 is set, in which case the user is
authenticated by submitting the RPG value. To enable remote updates, a distant user is always
authenticated by submitting that value. The W24 configuration site includes an authentication
form that automatically pops up on the remote browser when parameter updates are attempted.
The password submitted through this form must match the actual value of W24's local RPG
parameter. Otherwise, remote value updates are rejected.